General
-
Target
c219d7ee141516a077e50aeb7e325243_JaffaCakes118
-
Size
602KB
-
Sample
240826-cxwg5szcng
-
MD5
c219d7ee141516a077e50aeb7e325243
-
SHA1
24a794047f236a22b2986851e16ab0286fa0dd6b
-
SHA256
f1804c8b45e470416271e9baad14fcd682bda135449c1ce14a1e3c32f7170b4c
-
SHA512
1adee6a04153801b64133968511803b0a0701c0acd2baf9ab132055024e5cf48e8b792e8c6c9b3f8c70f0f02d2943d3f2e798d5d1c270413ab91d32934a2e396
-
SSDEEP
12288:djEaFZvkGGNUuWW1NVwCKn6GAx1d9H1BxyMGl9fDHxUNYL0ZpX79fr:djEaFmFN9v46flH7xyVfNGFb9fr
Static task
static1
Behavioral task
behavioral1
Sample
c219d7ee141516a077e50aeb7e325243_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c219d7ee141516a077e50aeb7e325243_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
c219d7ee141516a077e50aeb7e325243_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
c219d7ee141516a077e50aeb7e325243_JaffaCakes118
-
Size
602KB
-
MD5
c219d7ee141516a077e50aeb7e325243
-
SHA1
24a794047f236a22b2986851e16ab0286fa0dd6b
-
SHA256
f1804c8b45e470416271e9baad14fcd682bda135449c1ce14a1e3c32f7170b4c
-
SHA512
1adee6a04153801b64133968511803b0a0701c0acd2baf9ab132055024e5cf48e8b792e8c6c9b3f8c70f0f02d2943d3f2e798d5d1c270413ab91d32934a2e396
-
SSDEEP
12288:djEaFZvkGGNUuWW1NVwCKn6GAx1d9H1BxyMGl9fDHxUNYL0ZpX79fr:djEaFmFN9v46flH7xyVfNGFb9fr
-
Checks Android system properties for emulator presence.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
3System Checks
3